Web Services Security / Edition 1

Web Services Security / Edition 1

ISBN-10:
0072224711
ISBN-13:
9780072224719
Pub. Date:
01/31/2003
Publisher:
McGraw Hill LLC
ISBN-10:
0072224711
ISBN-13:
9780072224719
Pub. Date:
01/31/2003
Publisher:
McGraw Hill LLC
Web Services Security / Edition 1

Web Services Security / Edition 1

$64.0
Current price is , Original price is $64.0. You
$64.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Your definitive Web Services security resource

Minimize security risks in your system by successfully rolling out secure Web Services with help from this exceptional guide. Web Services Security covers everything network security professionals need to know, including details on Web Services architecture, SOAP, UDDI, WSDL, XML Signature, XML Encryption, SAML, XACML, XKMS, and more. You'll also get implementation techniques as well as case studies featuring global service-provision initiatives such as the Liberty Alliance Project. Practical, comprehensive, and up-to-date, this is a must-have reference for every administrator interested in conquering real-life security challenges through the effective use of Web Services.

  • Learn the high-level principles of security and how they apply to Web Services
  • Deploy Web Services technology following practical and clear examples
  • Use XKMS for validation and accountability
  • Ensure data integrity by using XML Signature and XML Encryption with SOAP
  • Use SAML and XACML for authentication and authorization
  • Learn the major components of the evolving ebXML standard
  • Gain valuable insight into the legal aspects of Web Services security—including digital signature laws, privacy issues, and application-to-application transactions

Product Details

ISBN-13: 9780072224719
Publisher: McGraw Hill LLC
Publication date: 01/31/2003
Series: Application Development
Pages: 312
Product dimensions: 7.40(w) x 9.10(h) x 0.70(d)

About the Author

Mark O’Neill is the principal author of Web Services Security (McGraw-Hill/Osborne, 2003). Mark has written on the topic of XML and web services security in magazines such as Web Services Journal, XML Journal, Java Pro, Enterprise Architect, Infoconomy, and Technology for Finance. As Chief Technical Officer at Vordel, a pioneering vendor of XML security products, Mark has met many early adopters of XML, gathering and synthesizing their security requirements. Mark regularly presents training courses on web services security in London, California, and on the U.S. East Coast. For the past four years, he has been chosen as a speaker on the topic of XML security at the RSA Conference, the infosec industry’s largest annual conference. Mark lives in an old house in Boston’s up-and-coming Roslindale neighborhood, with Kristen and their two-year-old son Ben.

Table of Contents

Forewordxiii
Acknowledgmentsxvii
Introductionxix
Part IIntroduction
1Presenting Web Services3
Defining Web Services4
Introducing the XML Family6
XML for Communication11
An Example Web Services Scenario12
Practical Tools19
2Presenting Security21
The Building Blocks of Security22
Confidentiality23
Integrity27
Nonrepudiation29
Authentication32
Authorization35
Availability36
Peeling Back the Layers of Security37
Network Layer37
Session and Transport Layers38
Application Layer: S/MIME39
3New Challenges and New Threats41
Web Services Security Challenges43
The Challenge of Security Based on the End User of a Web Service43
End-User Access to a Web Service: A Practical Example44
The Challenge of Maintaining Security While Routing Between Multiple Web Services48
The Challenge of Abstracting Security from the Underlying Network50
Meeting the Challenges: New Technologies for Web Services Security51
Persistent Security51
Web Services Security Threats55
Web Application Security55
The Role of Firewalls for Web Services57
Part IIXML Security
4XML Signature63
Making Sense of XML Signature65
An XML Signature Is a Digital Signature Expressed in XML65
An XML Signature May Be Placed Inside an XML Document71
XML Signature Allows Multiple Documents to Be Signed74
XML Signature Is "XML-Aware Signature"75
Uses of XML Signature for Web Services Security75
Persistent Integrity75
Nonrepudiation: How Useful Is the KeyInfo Element?76
Authentication76
Creating and Validating an XML Signature77
Creating an XML Signature77
Validating an XML Signature79
Checklist81
5XML Encryption83
Introduction to XML Encryption84
Persistent Encryption for Web Services Transactions84
XML-Aware Encryption85
Encryption Scenarios87
Encrypting an XML Element and Its Contents87
Encrypting the Content of an XML Element88
Encrypting Arbitrary Data (Including XML)88
CipherValue and CipherReference89
Encryption Steps90
Step 1Choose an Encryption Algorithm90
Step 2Obtain and (Optionally) Represent the Encryption Key92
Step 3Serialize the Data into UTF-8 Encoding94
Step 4Perform the Encryption94
Step 5Specify the Data Type94
Process the EncryptedData Structure95
Decryption Steps95
Step 1Determine the Algorithm, Parameters, and ds: KeyInfot95
Step 2Locate the Key95
Step 3Decrypt the Data95
Step 4Process XML Elements or XML Element Content96
Step 5Process Data that Is Not an XML Element or XML Element Content96
Code Examples96
Encrypting an XML Element Using Triple-DES96
Decrypting Using the IBM XML Security Suite DecryptionContext98
The Overlap with XML Signature98
Using XML Encryption on a Signed Document98
Using XML Signature on an Encrypted Document99
Checklist99
6SAML101
How SAML Enables "Portable Trust"102
Introducing the Three Types of Assertions106
SAML Architecture109
Deploying SAML113
VeriSign's Trust Services Integration Kit114
Checklist118
7XACML119
Introduction to XACML120
Basic Concepts of Access Control121
Rules in XACML121
Definition of a Rule in XACML: Target, Effect, and Conditions122
A "Policy" in XACML125
Digital Rights Management134
Security Considerations When Using XACML134
Checklist136
8XML Key Management Specification (XKMS)137
Public Key Infrastructure138
PKI in Five Easy Points139
XKMS and PKI140
The XKMS Protocol143
XML Key Information Service Specification147
XML Key Registration Service Specification153
Advanced Protocol Features of XKMS 2.0160
Compound Requests160
Asynchronous Processing160
Checklist162
Part IIISecurity in SOAP: Presenting WS-Security
9WS-Security165
Introduction to WS-Security166
WS-Security Abstractions166
IBM/Microsoft Web Services Security Road Map167
WS-Security Elements and Attributes170
Error Handling in WS-Security177
SAML and WS-Security178
Code Example: Using the Microsoft WSE179
Checklist181
Part IVSecurity in Web Services Frameworks
10.NET and Passport185
Ticket, Please: A Kerberos Overview186
Passport188
Prelude to the Login Process188
The Login Process189
Attacks Against Passport191
Malicious Partner Applications193
Privacy193
Web Services and .NET194
Framework194
Threats Against .NET Services196
Threats Against .NET Servers199
Protecting Your Servers200
Checklist201
11The Liberty Alliance Project203
What Does the Liberty Alliance Project Have To Do with Web Services?204
Terms to Remember205
Creating Circles of Trust Among Identity Providers and Service Providers206
Single Sign-On209
Identity Federation210
Name Registration217
Liberty Leading Web Services221
Defederating a Local Identity223
Single Logout224
Security in Liberty225
Liberty Today, Liberty Tomorrow225
Give Me Liberty or Give Me Passport226
12UDDI and Security227
UDDI Overview228
Securing Transactions with the UDDI Services232
Explaining the UDDI Roles233
Authenticating and Authorizing Publishers235
Authenticating and Authorizing Subscribers242
Checklist246
Part VConclusion
13ebXML249
ebXML250
Business Processes250
Collaboration Protocol Profile and Agreement250
Message Services251
Registry Information and Services251
ebXML Security Overview251
ebXML Registry Security252
Overview252
Standards Requirements252
Registry Security Conclusions253
ebXML Message Security254
Overview254
Standards Overview254
Authorization and Authentication254
Data Integrity and/or Confidentiality Attacks254
Denial of Service and/or Spoofing254
ebXML Standards Overview255
Message Security Conclusions257
14Legal Considerations259
The Role of Contract Law and Evidence in Online Security260
If Security Is the Answer, Then Exactly What Is the Question?261
Legal Components: A Primer261
Digital Signing262
Dispelling the Myths264
Mapping Legal Components to Technical Security Components266
Applying the Law to Particular Technologies270
Web Services: An Overview of Legally Relevant Technical Trends270
SAML: The Legality of "Distributed Trust"274
SSL: Legally, How Secure Is It?278
Biometrics: Is Seeing Believing?278
Conclusions279
Legal Security Is Holistic280
Effective Security Depends on Shared Cultural Assumptions280
The Best Security Is Designed to Fail Successfully281
Checklist282
ACase Studies285
Local Government Service Portal286
Project Overview286
Security Factors Identified287
Security Measures Deployed287
Foreign Exchange Transactions287
Project Overview288
Security Factors Identified288
Security Measures Deployed289
XML Gateway Rollout290
Project Overview290
Security Factors Identified290
Security Measures Deployed291
Index301
From the B&N Reads Blog

Customer Reviews